Download presentation
Published byDarrell Lambert Modified over 8 years ago
1
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated methods of verifying/recognizing the identity of a living person based on physiological or behavioral characteristics. Such characteristics are fingerprints, facial images, iris prints, and voice recognition.
2
The Basics of Biometric Devices
Much like passwords, biometric devices have an enrollment and verification process. You must first let the device have a record of what will be used to be authenticated. Uses personally identifiable information. This includes your fingerprint, iris, voice, or face. Devices are publically available to anyone with money. It is possible to purchase a biometric scanner of any sort to suit your security needs.
3
Fingerprint scanners are used in a variety of devices now-a- days
Fingerprint scanners are used in a variety of devices now-a- days. Most newer smartphones and laptops have them already built in, but you may also purchase them for your computer. Pros: Unique Identifier Quick enrollment Quick authentication Culturally accepted Cons: Injuries can affect authentication Storage of fingerprint algorithm may be replicated Personal identity used vs. passwords/PINs Fingerprint Scanners
4
Iris scanners are much like fingerprint scanners, but slightly more secure, and complex.
Enrollment usually takes a little longer than fingerprint scanners. Enrollment usually takes a digital picture and infrared/night vision picture. Pros: Iris is protected, and not commonly disfigured Patterns/textures stay the same for decades Cons: Poor digital images affect enrollment and authentication process Distance to scan iris may affect authentication User needs to stay still Iris Scanners
5
Facial recognition is another camera-based authentication much like iris scanning. However, it is not widely used for account or information security. In most cases, facial recognition is used in public places by security or law enforcement officials. Facial recognition can be used to pinpoint a wanted felon or suspected terrorist out of a group people. Pros: Picking people out of a crowd Securing minimally important information Cons: Twins? Picture of authenticated user bypass Facial Recognition
6
Voice recognition has came a long way in recent years
Voice recognition has came a long way in recent years. Most of it is used for Speech-to-text services like Google, Siri, Cortana, automated call centers, Xbox, and PlayStation. Not widely used for security. Voice recognition programs search from patterns detected in speech, tone, frequency, and use artificial neural networks. Pros: Hands-free use for multiple devices Good for typing-handicapped people Cons: Background noise can interfere Voices can be recorded; bad for security Voice Recognition
7
Radio Frequency Identification (RFID) Chips are used for multiple devices and objects, to identify and track them. NBC Predicts that in 2017, most humans will be implanted with RFID chips that contain all of our personal data, such as fingerprints, facial data, iris data, name. address, etc… Not a lot of people like the idea… RFID Chips
8
Biometric Impact on society
Biometric devices are mostly used for identification and security. Places with a need for high security use biometrics to protect sensitive information or materials from being exposed to the public. Public places use biometric technology to monitor and track people; certain public places may be scanning for wanted criminals. Helps people authenticate themselves to use certain devices without the need for a password or pin, no need to remember such things. Has some personally identifiable information privacy concerns. (Can our PID be hacked and stolen? [or even used against us].) Biometric Impact on society
9
Almost all biometric technologies are already in place, or developed, but most of these technologies have room to improve. New(ish) biometric technologies could be: the use of thermal imagining scanners, hand geometry scanners, signature recognition, type-behavioral patter recognition, internet usage patterns, and DNA and vein pattern scanners. The more biometrics improve, the more controversy surrounding privacy will arise. Future of Biometrics
10
Drawbacks of biometrics
Biometric devices are still under-developed, so most of these technologies have flaws concerning quality of performance, and questionable methods of storing personally identifiable information. Privacy issues concerning use of facial recognition technology in public places and on the internet. It would suck to have RFID chips forcefully implanted in us. Drawbacks of biometrics
11
References https://en.wikipedia.org/wiki/Biometric_device
cons your-life-in-the-near-future/ References
12
Biometrics No passwords are used Stored information has a potential to be hacked and stolen/used Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated methods of verifying/recognizing the identity of a living person based on physiological or behavioral characteristics. Such characteristics are fingerprints, facial images, iris prints, and voice recognition. RFID chips can hold information such as fingerprints, facial data, blood type, address, etc… Iris scanners, are highly secured, but a lot of memory and data has to be stored, and is intrusive. Facial recognition is mostly used in public places to track and identify people, and if you’re a wanted felon or suspected terrorist, you may be confronted. Fingerprint scanners are the most widely accepted and used type of biometric security devices. They are in a multitude of devices now-a-days. Voice recognition is used is a multitude of devices now-a-days
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.